Damage assessment and repair in attack resilient distributed database systems

Peng Liu, Meng Yu

Research output: Contribution to journalArticle

9 Citations (Scopus)

Abstract

Preventive measures sometimes fail to defect malicious attacks. With attacks on data-intensive applications becoming an ever more serious threat, intrusion tolerant database systems are a significant concern. The main objective of such systems is to detect attacks, and to assess and repair the damage in a timely manner. This paper focuses on efficient damage assessment and repair in distributed database systems. The complexity caused by data partition, distributed transaction processing, and failures makes intrusion recovery much more challenging than in centralized database systems. This paper identifies the key challenges and presents an efficient algorithm for distributed damage assessment and repair.

Original languageEnglish (US)
Pages (from-to)96-107
Number of pages12
JournalComputer Standards and Interfaces
Volume33
Issue number1
DOIs
StatePublished - Jan 1 2011

Fingerprint

Distributed database systems
damages
Repair
system of objectives
transaction
threat
Recovery
Defects
Processing

All Science Journal Classification (ASJC) codes

  • Software
  • Hardware and Architecture
  • Law

Cite this

@article{97e00d9d9b2149a3a98747283ab5ddab,
title = "Damage assessment and repair in attack resilient distributed database systems",
abstract = "Preventive measures sometimes fail to defect malicious attacks. With attacks on data-intensive applications becoming an ever more serious threat, intrusion tolerant database systems are a significant concern. The main objective of such systems is to detect attacks, and to assess and repair the damage in a timely manner. This paper focuses on efficient damage assessment and repair in distributed database systems. The complexity caused by data partition, distributed transaction processing, and failures makes intrusion recovery much more challenging than in centralized database systems. This paper identifies the key challenges and presents an efficient algorithm for distributed damage assessment and repair.",
author = "Peng Liu and Meng Yu",
year = "2011",
month = "1",
day = "1",
doi = "10.1016/j.csi.2010.03.009",
language = "English (US)",
volume = "33",
pages = "96--107",
journal = "Computer Standards and Interfaces",
issn = "0920-5489",
publisher = "Elsevier",
number = "1",

}

Damage assessment and repair in attack resilient distributed database systems. / Liu, Peng; Yu, Meng.

In: Computer Standards and Interfaces, Vol. 33, No. 1, 01.01.2011, p. 96-107.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Damage assessment and repair in attack resilient distributed database systems

AU - Liu, Peng

AU - Yu, Meng

PY - 2011/1/1

Y1 - 2011/1/1

N2 - Preventive measures sometimes fail to defect malicious attacks. With attacks on data-intensive applications becoming an ever more serious threat, intrusion tolerant database systems are a significant concern. The main objective of such systems is to detect attacks, and to assess and repair the damage in a timely manner. This paper focuses on efficient damage assessment and repair in distributed database systems. The complexity caused by data partition, distributed transaction processing, and failures makes intrusion recovery much more challenging than in centralized database systems. This paper identifies the key challenges and presents an efficient algorithm for distributed damage assessment and repair.

AB - Preventive measures sometimes fail to defect malicious attacks. With attacks on data-intensive applications becoming an ever more serious threat, intrusion tolerant database systems are a significant concern. The main objective of such systems is to detect attacks, and to assess and repair the damage in a timely manner. This paper focuses on efficient damage assessment and repair in distributed database systems. The complexity caused by data partition, distributed transaction processing, and failures makes intrusion recovery much more challenging than in centralized database systems. This paper identifies the key challenges and presents an efficient algorithm for distributed damage assessment and repair.

UR - http://www.scopus.com/inward/record.url?scp=78649325205&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78649325205&partnerID=8YFLogxK

U2 - 10.1016/j.csi.2010.03.009

DO - 10.1016/j.csi.2010.03.009

M3 - Article

AN - SCOPUS:78649325205

VL - 33

SP - 96

EP - 107

JO - Computer Standards and Interfaces

JF - Computer Standards and Interfaces

SN - 0920-5489

IS - 1

ER -